ISO 27001 Consulting “As-A-Service”

Your hub for the fundamentals of ISO 27001 compliance, best practices, and resources for GRC professionals.

The ISO 27001 standard is essential for organizations aiming to develop a solid information security framework. An Information Security Management System (ISMS) aligned with ISO 27001 not only aids in reducing security threats but also bolsters trust, supports compliance with legal and regulatory requirements, and offers a competitive edge in the modern, data-centric, and interconnected commercial landscape.

ISO 27001 is the premier international standard for information security management. 

Before embarking on the journey to ISO 27001 compliance, it is crucial to understand the framework’s requirements, which are designed to assist organizations of any size and industry in systematically and cost-effectively protecting their information. For comprehensive guidance on implementing an Information Security Management System (ISMS) in line with ISO 27001, Kootek offers resources that detail the process from initial understanding to full compliance.

 

At Kootek, we can offer the following ISO27001 Consultancy Services:

  • ISO27001 Gap Analysis,
  • ISO27001 Implementation,
  • ISO27001 Compliance Audit,
  • ISO27001 Internal Audit.

Features:

-Help to develop your Information Security Management System controls
-Gap analysis audit on ISO27001 providing targeted remediation
-Our staff are qualified as ISO27001 internal auditors
-Ensure compliance with organisational policies
-Development of suitable policies and procedures and technical controls
-Review of certification readiness
-Review of supplier information risk

 

Benefits:

-Reduces business risk
-ISO27001 shows your customers that you take information security seriously
-You meet an internationally recognized best practice standard
-Supports compliance with other standards




Key components of an ISO 27001 project 

 

Gap analysis

Assessing compliance with ISO 27001 often reveals that many of the standard’s controls are already in place.
Initiating an ISO 27001 gap analysis is a critical first step. This analysis will pinpoint areas of non-compliance, enabling the implementation of necessary security measures most efficiently and cost-effectively.

Penetration Testing

Penetration testing is a critical element of any ISMS that complies with ISO 27001 standards. It helps in pinpointing technical weaknesses that could jeopardize your organization’s information assets. Regular testing is imperative, spanning from the initial development phase through to continuous maintenance and improvement, adhering to control objective A.18.2.3.

Employee awareness training.

Clause 7.2 of ISO 27001:2022 mandates that an organization must verify the competence of personnel whose work impacts its information security performance. Conducting regular staff awareness training is essential to equip your team with the necessary knowledge and skills, thereby ensuring the attainment and preservation of your ISO 27001 certification.

Documentation

Neglecting to document ISO 27001 policies and processes may result in nonconformity. Kootek provides customizable documentation templates that enable you to establish the necessary records for achieving and sustaining compliance with the standard.

Risk Assessment

Assessment and management of information security risks are fundamental to ISO 27001. Discover the methods for conducting consistent, valid, and comparable risk assessments compliant with ISO 27001 standards.

Implementation

For a comprehensive understanding, consult our concise guide on the ISO 27001 implementation process. It encompasses the entire journey from acquainting oneself with the Standard to establishing a project, and culminates with the audit and certification stages.

Beginner's Guide: ISO27001 Compliance

Approximately 44,000 organizations have achieved ISO 27001 certification, and the trend is upward each year. This growth indicates a rising recognition of its significance in today’s business landscape. However, comprehending this standard can be challenging for those new to the concept.
This article will offer an overview of ISO 27001, its importance, and best practices for attaining certification, among other insights.

What is ISO 27001?

ISO/IEC 27001 sets the international standard for information security, detailing the criteria for a comprehensive Information Security Management System (ISMS). It employs a risk management approach, encompassing personnel, procedures, and technology.  It’s based on a set of ISO 27001 controls and measures, which organizations can use to achieve information security. Attaining ISO 27001 certification signifies that an organization’s information security practices are consistent with global best practices.

The ISO 27001 standard mandates the establishment of procedures to address various components of the ISMS, which include:

  • Information security risk management (Identifying the risks and determining the methods for their treatment.)
  • Monitoring, measurement, analysis, and evaluation (Assessing the effectiveness of the information security management system.)
  • Improvement (Evaluating and addressing nonconformities.)

Who Needs ISO 27001?

Businesses expanding into international markets can show their commitment to safeguarding customer data by adopting ISO 27001. This standard helps organizations to assure customers that they are managing the confidentiality, integrity, and availability of information through a systematic risk management process. Its main goal is to enable organizations to develop, implement, sustain, and consistently enhance their Information Security Management System (ISMS).

Why is ISO 27001 Important?

The ISO 27001 standard serves as a robust framework for maintaining the security of your company’s information, provided it is implemented correctly. It offers a systematic method for the implementation, integration, and continual enhancement of your Information Security Management System (ISMS). 


By adopting this standard, you can safeguard assets against internal and external threats through:

– A thorough understanding of the organization’s needs, requirements, and risk appetite.

– The application of policies, procedures, and controls to govern these risks within the organization’s established tolerance levels.

– Regular monitoring of performance in adherence to these standards.

What are the ISO 27001 requirements?

While ISO 27001 centers on the implementation of an ISMS (Information Security Management System), it does not enforce a universal set of controls for compliance. This is due to the recognition that each organization is distinct, with specific information security needs. Rather than prescribing a uniform set of requirements, ISO 27001 obliges organizations to engage in activities that guide their selection of appropriate controls. This blog post will outline those activities and provide guidance on how to execute them.

 

Mandatory ISO 27001 requirements

The most important activities when implementing ISO 27001 are:

  • Scoping your ISMS

Documenting the scope of an ISMS involves defining the information assets that require protection. There are likely more information and locations where information is stored than initially anticipated, so it is crucial to thoroughly identify all relevant aspects of your organization. The process for this is detailed in Clause 4.3 of the Standard.

  • Conducting risk assessment

Clause 6.1.2 of the Standard mandates that organizations must “define and apply” a risk assessment process. This process is a structured, top management-led activity that forms the cornerstone of the Information Security Management System (ISMS).

  • Defining a risk treatment methodology

A Risk Treatment Plan (RTP) is a crucial component of an organization’s ISO 27001 implementation process, as it outlines the organization’s approach to managing identified threats. Organizations can decide on the most effective way to address a risk by consulting the controls specified in Annex A of ISO 27001.

 

Organisations are also required to complete the following mandatory clauses:

  • Information security policy and objectives (clauses 5.2 and 6.2)
  • Information risk treatment process (clause 6.1.3)
  • Risk treatment plan (clauses 6.1.3 e and 6.2)
  • Risk assessment report (clause 8.2)
  • Records of training, skills, experience and qualifications (clause 7.2)
  • Monitoring and measurement results (clause 9.1)
  • Internal audit programme (clause 9.2)
  • Results of internal audits (clause 9.2)
  • Results of the management review (clause 9.3)
  • Results of corrective actions (clause 10.1)
Annex A: Reference control objectives and Controls
 

Annex A offers organizations a catalog of controls for assessing their relevance in risk mitigation. While these controls are not compulsory, it is essential to evaluate whether all the necessary Annex A controls have been reviewed and that none that are required have been excluded.

 

Depending on the controls your organisation selects, you will also be required to document:

  • Definition of security roles and responsibilities (clauses A.7.1.2 and A.13.2.4)
  • Inventory of assets (clause A.8.1.1)
  • Acceptable use of assets (clause A.8.1.3)
  • Access control policy (clause A.9.1.1)
  • Operating procedures for IT management (clause A.12.1.1)
  • Secure system engineering principles (clause A.14.2.5)
  • Supplier security policy (clause A.15.1.1)
  • Incident management procedure (clause A.16.1.5)
  • Business continuity procedures (clause A.17.1.2)
  • Statutory, regulatory, and contractual requirements (clause A.18.1.1)
  • Logs of user activities, exceptions, and security events (clauses A.12.4.1 and A.12.4.3).
  • Statement of Applicability
The Statement of Applicability (SoA) is a crucial document in the information risk treatment process. It details the Annex A controls that have been implemented or excluded, providing reasons for these decisions. Additionally, it should contain further details about each control and references to the corresponding implementation documentation.
 
  • Document Information Security Policies
The policies you establish will form the cornerstone of your information security strategy. They should be clearly defined, approved, disseminated, and communicated across the organization. Your policy must be pertinent to your organization, articulate your information security goals, demonstrate a commitment to meeting ISO 27001 standards and the associated Annex A controls, and promote the ongoing enhancement of the ISMS.
 
  • Operationalize your ISMS

To operationalize your Information Security Management System (ISMS), implement processes that align with Clauses 6 through 10. These include planning, risk assessment, document control, procedure implementation, and monitoring, ensuring that your strategy and policies are continuously updated and improved. It’s crucial to synchronize your strategy and policies with tactical activities, demonstrating that your ISMS is both operational and repeatable. This involves the ability to assess risks, carry out control processes, monitor metrics, and identify and execute corrective actions.

  • Internal Audit

Completing an internal audit is essential for the independent evaluation of your ISMS. It assists in identifying any nonconformities, assessing the effectiveness of your ISMS, and uncovering areas for potential enhancement.

  • Implement Corrective actions from the internal audit

Following the findings of your internal audit, you should implement corrective actions for any identified nonconformities. Your action plan should detail:

  • The specific nonconformity.
  • Your strategy for correction, control, and management of the nonconformity’s consequences.
  • The underlying cause of the nonconformity.
  • The efficacy of your corrective measures

 

  • ISMS Review

Senior-level management must regularly review the ISMS to guarantee its effectiveness and alignment with the organization’s objectives.
Establish periodic review meetings to cover:
– Changes within or outside the organization that affect the ISMS.
– Progress reports on previous ISMS reviews.
– Feedback from internal audits, risk evaluations, and stakeholders.
– Any modifications or enhancements.
Ensure that the outcomes and follow-up actions of your reviews are well-documented.

  • Choose an Accredited Certification Body


When you’re prepared to pursue ISO 27001 certification, it’s necessary to select an accredited certification body to conduct the audits—both Stage 1 and Stage 2. The Stage 1 audit focuses on reviewing your documentation to assess your preparedness for Stage 2. The Stage 2 audit is a comprehensive examination of your ISMS to verify compliance with the standards, effective implementation of the necessary controls, and adherence to your internal policies and procedures.

  • Implement corrective actions from identified Nonconformities

Audit findings can present an opportunity to enhance your information security strategy. Should your auditor pinpoint any nonconformities, it’s crucial to execute corrective measures and monitor their efficacy.

What are the control changes in Annex A?

Several Annex A controls have been merged, while 11 have been added:

  • Even though no controls have been removed, ISO 27001:2022 lists only 93 controls rather than ISO 27001:2013’s 114. This is due to the large number of merged controls (56 into 24).
  • These controls are grouped into 4 ‘themes’ rather than 14 clauses. They are:
    • People (8 controls)
    • Organisational (37 controls)
    • Technological (34 controls)
    • Physical (14 controls)
  • The completely new controls are:
    • Threat intelligence
    • Information security for use of Cloud services
    • ICT readiness for business continuity
    • Physical security monitoring
    • Configuration management
    • Information deletion
    • Data masking
    • Data leakage prevention
    • Monitoring activities
    • Web filtering
    • Secure coding
  • In ISO 27002, the controls also have five types of ‘attribute’ to make them easier to categorise:
    • Control type (preventive, detective, corrective)
    • Information security properties (confidentiality, integrity, availability)
    • Cyber security concepts (identify, protect, detect, respond, recover)
    • Operational capabilities (governance, asset management, etc.)
    • Security domains (governance and ecosystem, protection, defence, resilience)

The changes of ISO/IEC 27001:2022

ISO 27001:2022 does not present significant deviations from its 2013 predecessor; however, it introduces some noteworthy modifications. These changes are primarily associated with Annex SL, which is the overarching structure shared by all new ISO management system standards, and not specifically with information security measures.

  • Context and scope

    You must now identify the “relevant” requirements of interested parties and determine which requirements will be addressed through the ISMS.

    The ISMS must now explicitly includes the “processes needed and their interactions”.

  • Planning

    Information security objectives must now be monitored and “be available as documented information”.

    There is a new subclause on planning changes to the ISMS. This does not specify any processes that must be included, so you should determine how you can demonstrate that changes to the ISMS have indeed been planned.

  • Support

    The requirements to define who will communicate, and the processes for effecting communication, have been replaced by a requirement to define “how to communicate”.

  • Operation

    The requirement to plan how to achieve information security objectives has been replaced by a requirement to establish criteria for processes to implement actions identified in Clause 6, and to control those processes in line with the criteria.

    Organisations are now required to control “externally provided processes, products or services” relevant to the ISMS rather than just processes.

ISO/IEC 27001:2022 Lead Auditor

About this certification: The ISO/IEC 27001:2022 Lead Auditor certification is awarded to practitioners who demonstrate advanced expertise in assessing information security management system (ISMS) scopes. Kootek is proud to be awarded a mastery in leading audit teams and applying globally recognized audit principles, methodologies, and techniques in alignment with ISO/IEC 27001, as well as related standards such as ISO/IEC 17021 and ISO/IEC 27006-1.

Subscribe

* indicates required
Kootek Consulting

LET’S KEEP IN TOUCH!

We’d love to keep you updated with our latest news and current trends in Information Security

Sign up to our monthly newsletter to receive free security tips & latest update directly in your inbox

We don’t spam! Read our privacy policy for more info.

Scroll to Top